Nicht aus der Schweiz? Besuchen Sie lehmanns.de
RFID Security -  Chris Lanthem,  Frank Thornton

RFID Security (eBook)

eBook Download: PDF
2006 | 1. Auflage
448 Seiten
Elsevier Science (Verlag)
978-0-08-048965-0 (ISBN)
Systemvoraussetzungen
39,90 inkl. MwSt
(CHF 38,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books.

RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems.

Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).

The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. .

* Deloitte & Touche expects over 10 billion RFID tags to be in circulation by the end of 2005
* Parties debating the security issue of RFID need information on the pros and cons of the technology and this is that information
* Little competition in a market desperate for information
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. .* Deloitte & Touche expects over 10 billion RFID tags to be in circulation by the end of 2005 * Parties debating the security issue of RFID need information on the pros and cons of the technology and this is that information* Little competition in a market desperate for information

Cover 1
Contents 13
Part I: Overview 23
Chapter 1: What Is RFID? 25
Introduction 26
What This Book Is and Is Not 27
RFID Radio Basics 31
Why Use RFID? 33
RFID Architecture 35
Data Communications 39
Physical Form Factor (Tag Container) 43
Summary 49
Links to Sites 49
Chapter 2: RFID Uses 51
Introduction 52
Applied Use 55
Standards in the Marketplace 60
Failures in the Marketplace 62
RFID for the Consumer: Case Studies 66
Summary 76
References 76
Part II: Attacking RFID 77
Chapter 3: Threat and Target Identification 79
Introduction 80
Attack Objectives 80
Blended Attacks 87
Chapter 4: RFID Attacks: Tag Encoding Attacks 89
Introduction 90
Case Study: Johns Hopkins vs. SpeedPass 90
The SpeedPass 91
Summary 104
Chapter 5: RFID Attacks: Tag Application Attacks 105
MIM 106
Chip Clones—Fraud and Theft 106
Tracking: Passports/Clothing 112
Chip Cloning > Fraud
Disruption 120
Summary 121
Chapter 6: RFID Attacks: Securing Communications Using RFID Middleware 123
RFID Middleware Introduction 124
Understanding Security Fundamentals and Principles of Protection 144
Addressing Common Risks and Threats 159
Securing RFID Data Using Middleware 163
Using DES in RFID Middleware for Robust Encryption 165
Using Stateful Inspection in the Application Layer Gateway For Monitoring RFID Data Streams 167
Providing Bulletproof Security Using Discovery, Resolution, and Trust Services in AdaptLink™ 170
Summary 173
Chapter 7: RFID Security: Attacking the Backend 175
Introduction 176
Overview of Backend Systems 176
Virus Attacks 182
RFID Data Collection Tool— Backend Communication Attacks 184
Attacks on ONS 185
Summary 188
Part III: Defending RFID 189
Chapter 8: Management of RFID Security
Introduction 192
Risk and Vulnerability Assessment 192
Risk Management 195
Threat Management 198
Summary 201
Chapter 9: Case Study: Using Commerce Events’ AdaptLink™ to Secure the DoD Supply Network— Leveraging the DoD RFID Mandate 203
Background on the Use of RFID in the DoD Supply Chain 204
Improved Asset Tracking for the DoD Is Critical 208
A Proposed Solution in Silent Commerce 212
References 241
Summary 242
Appendix A: Additional RFID Reference Material 243
Frequently Asked Questions 244
RFID Solutions Fast Track 247
Index 251
Techno Security Registration 266

Erscheint lt. Verlag 25.5.2006
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Wirtschaft Betriebswirtschaft / Management
ISBN-10 0-08-048965-6 / 0080489656
ISBN-13 978-0-08-048965-0 / 9780080489650
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
CHF 48,75
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
CHF 78,15